Keyword: Possible_OLGM-23
16374 Total Search   |   Showing Results : 1401 - 1420
Installation This Backdoor drops the following files: %User Temp%\XHXNC.dll (Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings
To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan arrives as attachment to mass-mailed email messages. It accesses websites
Installation This Trojan drops the following files: %Windows%\DelCache.bat %System%\UIDRUNSRV.DLL {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} -->
Other Details This Trojan adds the following lines or registry entries as part of its routine:
This Backdoor adds registry entries to enable its automatic execution at every system startup. Autostart Technique This Backdoor adds the following registry entries to enable its automatic execution
Installation This Trojan drops the following files: %User Temp%\1.EXE %User Temp%.EXE (Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}
Other Details This Trojan adds the following lines or registry entries as part of its routine:
It arrives by connecting affected removable drives to a system. It adds registry entries to enable its automatic execution at every system startup. It modifies registry entries to enable its
This malware exploits a software vulnerability in order to drop a malicious file onto the affected system. It also drops and opens a document file in order to hide its malicious routines. Once a
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan may be downloaded by
This Trojan arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It displays fake alerts that warn users of
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This joke program plays the music video of Friday by Rebecca Black while randomly moving around the browser window. It continuously displays a message box 579 times. This joke program may be hosted
NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: Qakbot Files detected as MAL_QAKCFG1 are usually
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan